RE: Wireless LAN question

2002-07-04 Thread Chisholm Wildermuth
more free info :-) Water is actually the best insulator for radio waves that I am aware of, followed by some metals. Chisholm Wildermuth Systems Engineer dbWebNet, Inc. -- The opinions expressed here are my own and do not nece

RE: windows 2000 Intrustion Detection

2002-06-01 Thread Chisholm Wildermuth
Yep. Best IDS for 2k is a Linux box with Snort :-) -Original Message- From: Jonathan Roberts [mailto:[EMAIL PROTECTED]] Sent: Thursday, May 30, 2002 10:49 AM To: [EMAIL PROTECTED] Subject: windows 2000 Intrustion Detection Could someone just outright come out and tell me what the best

RE: (Verisign) Misleading mailing is not a good way to get customers.

2002-06-01 Thread Chisholm Wildermuth
practices. Chisholm Wildermuth -Original Message- From: Adam Shephard [mailto:[EMAIL PROTECTED]] Sent: Thursday, May 30, 2002 12:44 PM To: 'Chris Santerre'; Security-Basics (E-mail) Subject: RE: (Verisign) Misleading mailing is not a good way to get customers. You JUST got this? Wo

RE: Securing Cisco Switches - Hints wanted!

2002-05-31 Thread Chisholm Wildermuth
.I don't know if I'd follow them exactly, but they're good guidelines to start out. Chisholm Wildermuth Systems Engineer dbWebNet, Inc. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] Sent: Wednesday, May 29, 2002 4:58 AM To: [EMAIL PROTECTED] Subje

RE: banned sites lists!

2002-05-30 Thread Chisholm Wildermuth
in conjunction with a proxy server." --- Why would you do both ? IMHO Content filtering should still be done at a proxy and not with an archaic file whose life ended with that of the original ARPANet. Chisholm Wildermuth Systems Engineer dbWebNet, Inc. --

RE: banned sites lists!

2002-05-30 Thread Chisholm Wildermuth
Maybe I'm misunderstanding what you're saying ("listing is used so that folks can modify their hosts file")but I _WOULD NOT EVER_ put anything with one thousand one hundred and ninety eight lines as my host file. MS even recommends you not use the template host file with comments because that

IP Protocol #'s

2002-05-20 Thread Chisholm Wildermuth
Protocol 1 ? Where's the other 46? What do they do..etc..etc. It's just something I've been wondering, and can't seem to find much info on. TIA for all help :-) Chisholm Wildermuth Systems Engineer dbWebNet, Inc.

RE: Webservers

2002-05-17 Thread Chisholm Wildermuth
Agree with Rob :-) -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] Sent: Friday, May 17, 2002 9:24 AM To: [EMAIL PROTECTED] Subject: Re: Webservers On Wed, May 15, 2002 at 11:46:41AM -0500, Robert Buel wrote: > That would be true if both NOS's required equal intuit

RE: Webservers

2002-05-15 Thread Chisholm Wildermuth
I disagree, It's like the difference of learning the QWERTY keyboard layout compared to DVORAK. Once you learn one it's hard to switch, but the learning curve on both are probably equal if you're just starting out. Chisholm Wildermuth Systems Enginee

RE: Webservers

2002-05-12 Thread Chisholm Wildermuth
h about 6 lines of code) Chisholm Wildermuth Systems Engineer dbWebNet, Inc. --- The opinions expressed here are my own and do not necessarily reflect those of my employer. -Original Message- From: Tom Geldner

RE: Disabling/Renaming Root ID

2002-05-12 Thread Chisholm Wildermuth
be doing anyhow) ;-) Chisholm Wildermuth Systems Engineer dbWebNet, Inc. --- The opinions expressed here are my own and do not necessarily reflect those of my employer. -Original Message- From: Khuzairi Yahaya

RE: Low budget VPN?????

2002-05-12 Thread Chisholm Wildermuth
to set it up, let me know. Chisholm Wildermuth Systems Engineer dbWebNet, Inc. --- The opinions expressed here are my own and do not necessarily reflect those of my employer. -Original Message- From: Peter Mu

RE: Wireless Technology (can it be secured and how)

2002-05-12 Thread Chisholm Wildermuth
uired to go through a VPN connection to a Win2k server first. That's three steps which will almost insure the most secure wireless environment possible. If you need it, the next step would definitely be a Tempest rated office environment. Chisholm Wildermuth

RE: Wireless Technology (can it be secured and how)

2002-05-12 Thread Chisholm Wildermuth
uestion then becomes should you even be running any wireless at all? Chisholm Wildermuth Systems Engineer dbWebNet, Inc. --- The opinions expressed here are my own and do not necessarily reflect those of my employer. -

RE: Active directory / Sonicwall soho3

2002-05-10 Thread Chisholm Wildermuth
If you're using VPN, then all traffic should go through the tunnel, no matter what port it is on. Can you be more specific as what "Active Directory" traffic is ?? Do you need name resolution, DHCP'd addresses..etc. Chisholm Wildermuth Systems Engineer dbWebNet, Inc. -